nginx -- SPDY memory corruption

Details

VuXML ID

89db3b31-a4c3-11e3-978f-f0def16c5c1b

Discovery

2014-03-04

Entry

2014-03-06

The nginx project reports:

A bug in the experimental SPDY implementation in nginx 1.5.10 was found,
which might allow an attacker to corrupt worker process memory by using
a specially crafted request, potentially resulting in arbitrary code
execution (CVE-2014-0088).

The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with
the ngx_http_spdy_module module (which is not compiled by default), if
the "spdy" option of the "listen" directive is used in a configuration
file.